DocumentCode
2926014
Title
Evaluating geographic vulnerabilities in networks
Author
Gardner, M. Todd ; Beard, Cory
Author_Institution
Fed. Aviation Adm., Kansas City, MO, USA
fYear
2011
fDate
10-12 May 2011
Firstpage
1
Lastpage
6
Abstract
In wireless ad-hoc and wireline networks used for search and rescue, military operations, and emergency communications; many failure modes are geographic in nature. They include jammers, explosions, enemy attacks, terrain issues, and natural causes like floods, storms, and fires. This paper proposes two methods to gain valuable insights into the physical topography and geographic vulnerabilities of networks. The 2-Terminal method and All-Terminal method find areas that given a threat of a certain radius can disconnect either the source and destination pair or any component of the network respectively. We believe that these methods could be used to optimize network node selection, placement and design. To be tractable, both methods incorporate innovative search techniques to use the size of the threat to reduce the complexity of the search.
Keywords
ad hoc networks; geography; geophysical techniques; jamming; 2-terminal method; all-terminal method; emergency communication; enemy attack; explosion; failure mode; geographic vulnerability; jammer; military operation; natural cause; network node design; network node placement; network node selection; physical topography; search and rescue; terrain issue; wireless ad-hoc network; wireline network; Algorithms; Disaster response; Disruption-tolerant networks; Network planning and topology; Network structure and dynamics; Robustness and vulnerability;
fLanguage
English
Publisher
ieee
Conference_Titel
Communications Quality and Reliability (CQR), 2011 IEEE International Workshop Technical Committee on
Conference_Location
Naples, FL
Print_ISBN
978-1-4577-1297-5
Electronic_ISBN
978-1-4577-1296-8
Type
conf
DOI
10.1109/CQR.2011.5996078
Filename
5996078
Link To Document